期刊文献+

基于零空间的网络编码云存储完整性校验方案 被引量:5

Data integrity check based on null space for network coding based cloud storage
原文传递
导出
摘要 基于网络编码云存储的数据完整性校验过程,面临着验证过程中计算开销较大、安全性弱等问题。为解决这些问题,该文提出了基于零空间的网络编码云存储数据完整性校验方案——NS-NCCS。该方案首先计算出原始信息的零空间,利用零空间生成验证向量,并将验证向量发送给独立的第3方验证节点完成数据验证。分析与计算结果表明:与NC-Audit方案相比,该方案在完整性验证过程中可以显著降低漏检率、有效防止验证节点反推出原始信息、节省计算开销以及有效支持数据修复。 The process of data integrity check for network coding based cloud storage has problems of poor safety and large computational overhead. A scheme of data integrity check was developed based on null space for network coding based cloud storage (NS-NCCS) to solve these problems. In the scheme, the null space of original information is calculated and used to generate the integrity verification vector which is then sent to an independent third-party verification node for data integrity validation. Analyses and simulations show that compared with NC-Audit, NS-NCCS significantly decreases the omission factor during the data integrity checking and effectively prevents the original information disclosure in the process of verification, with the computational overhead reduced and data repair supported.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2016年第1期83-88,96,共7页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金资助项目(61173169)
关键词 零空间 网络编码 完整性 云存储 null spacer network coding data integrity cloud storage
  • 相关文献

参考文献15

  • 1Hu Y, Chen H C H, Lee P P C, et al. NCCloud: Applying network coding for the storage repair in a cloud-of-clouds [C]//USENIXFAST. 2012: 265 -272.
  • 2Shah M A, Swaminathan R, Baker M. Privacy-preserving audit and extraction of digital contents, HP Labs Technical Report No. HPL2008-32[R]. 2008.
  • 3Bowers K D, Juels A, Oprea A. Proofs of retrievability: Theory and implementation[C]// Proceedings of the 2009 ACM Workshop on Cloud Computing Security. ACM, 2009: 43 - 54.
  • 4Bowers K D, Juels A, Oprea A. HAIL: A high-availability and integrity layer for cloud storage [C]//Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, 2009: 187-198.
  • 5Wang C, Wang Q, Ren K, et al. Toward secure and dependable storage services in cloud computing [J]. IEEE Transactions on Services Computing, 2012, 5(2) : 220 -232.
  • 6Rodrigues R, Liskov B. High availability in DHTs: Erasure coding vs. replication [M]//Peer-to-Peer Systems IV. Springer Berlin Heidelherg, 2005 : 226 - 239.
  • 7Dikaliotis T K, Dimakis A G, Ho T. Security in distributed storage systems by communicating a logarithmic number of bits [C]//2010 IEEE International Symposium on Information Theory Proceedings (ISIT). IEEE, 2010: 1948- 1952.
  • 8Chen H C H, Lee P P C. Enabling data integrity protection in regenerating-coding based cloud storage [C]// 31st Symposium on Reliable Distributed Systems (SRDS). IEEE, 2012:51-60.
  • 9Chen B, Curtmola R, Ateniese G, et al. Remote data checking for network coding based distributed storage systems [C]//Proceedings of the 2010 ACM Workshop on Cloud Computing Security. ACM, 2010: 31 - 42.
  • 10Ire A, Markopoulou A. NC-Audit: Auditing for network coding storage [C]//Network Coding (NetCod), 2012 International Symposium on. IEEE, 2012: 155-160.

同被引文献34

引证文献5

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部